dailywiki.exe

DailyWiki

The executable dailywiki.exe has been detected as malware by 1 anti-virus scanner. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘DailyWiki’.
Publisher:
DailyWiki  (signed and verified)

MD5:
f82506cb30d58a62603c1113eb66ff6c

SHA-1:
64ca3675d94003e61ed23cd80ccd1b613123d6f8

SHA-256:
11b2ae64849ce047c5582039f5dc3ddc9969705c06d48399df21513486e01f84

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
5/21/2024 11:51:24 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
16.9.2.1

File size:
47.9 MB (50,242,400 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\dailywiki\dailywiki.exe

Digital Signature
Signed by:

Authority:
DailyWiki

Valid from:
9/19/2015 11:16:51 AM

Valid to:
9/16/2025 11:16:51 AM

Subject:
CN=DailyWiki, O=DailyWiki, S=Some-State, C=US

Issuer:
CN=DailyWiki, O=DailyWiki, S=Some-State, C=US

Serial number:
00DE81C7E6A224F568

File PE Metadata
Compilation timestamp:
2/20/2016 3:43:51 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
786432:euK9C64r1c7VQZgnUrurLpbH05yL5dsuUQq6+4UYOkdOXQpn3hAQ:nwC64r1c6ZgnUSrLpbUAdBUQq6/BLFnV

Entry address:
0x1C9A031

Entry point:
E8, 5A, 3A, 01, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 8B, 55, 0C, A1, 20, A8, EC, 02, F7, D2, 8B, 4D, 08, 23, D0, 23, 4D, 0C, 0B, D1, 89, 15, 20, A8, EC, 02, 5D, C3, E8, 09, 21, 00, 00, 85, C0, 74, 08, 6A, 16, E8, CC, 21, 00, 00, 59, F6, 05, 20, A8, EC, 02, 02, 74, 21, 6A, 17, E8, D9, 20, 60, 00, 85, C0, 74, 05, 6A, 07, 59, CD, 29, 6A, 01, 68, 15, 00, 00, 40, 6A, 03, E8, A9, F8, FF, FF, 83, C4, 0C, 6A, 03, E8, 16, FC, FF, FF, CC, 55, 8B, EC, 8D, 45, 18, 50, 6A, 00, FF, 75, 14, FF, 75, 10, FF, 75, 0C, FF, 75...
 
[+]

Entropy:
6.9681

Code size:
34.9 MB (36,634,112 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
DailyWiki

Command:
C:\users\{user}\appdata\roaming\dailywiki\dailywiki.exe su


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to waws-prod-bay-003.cloudapp.net  (137.117.17.70:443)

TCP (HTTP SSL):
Connects to server-54-230-196-161.lhr50.r.cloudfront.net  (54.230.196.161:443)

TCP (HTTP SSL):
Connects to server-54-192-9-165.lhr3.r.cloudfront.net  (54.192.9.165:443)

TCP (HTTP SSL):
Connects to rtr3.l7.search.vip.ir2.yahoo.com  (217.12.15.96:443)

TCP (HTTP SSL):
Connects to mc.yandex.ru  (213.180.193.119:443)

TCP (HTTP SSL):
Connects to ec2-54-68-200-130.us-west-2.compute.amazonaws.com  (54.68.200.130:443)

TCP (HTTP SSL):
Connects to ec2-54-225-239-132.compute-1.amazonaws.com  (54.225.239.132:443)

TCP (HTTP SSL):
Connects to ec2-52-86-81-116.compute-1.amazonaws.com  (52.86.81.116:443)

TCP (HTTP SSL):
Connects to ec2-52-2-232-163.compute-1.amazonaws.com  (52.2.232.163:443)

TCP (HTTP SSL):
Connects to ec2-52-206-182-223.compute-1.amazonaws.com  (52.206.182.223:443)

TCP (HTTP SSL):
Connects to ec2-23-23-104-24.compute-1.amazonaws.com  (23.23.104.24:443)

TCP (HTTP SSL):
Connects to e2.ycpi.vip.lob.yahoo.com  (87.248.114.12:443)

TCP (HTTP SSL):
Connects to dcl4-frf.eu9-frf.force.com  (85.222.129.189:443)

TCP (HTTP):
Connects to cluster017.ovh.net  (213.186.33.50:80)

TCP (HTTP SSL):
Connects to a95-101-177-129.deploy.akamaitechnologies.com  (95.101.177.129:443)

TCP (HTTP SSL):
Connects to a92-123-180-201.deploy.akamaitechnologies.com  (92.123.180.201:443)

TCP (HTTP SSL):
Connects to a92-123-180-186.deploy.akamaitechnologies.com  (92.123.180.186:443)

TCP (HTTP SSL):
Connects to a92-123-180-115.deploy.akamaitechnologies.com  (92.123.180.115:443)

TCP (HTTP):
Connects to a104-86-111-88.deploy.static.akamaitechnologies.com  (104.86.111.88:80)

TCP (HTTP):
Connects to 114.255.178.107.bc.googleusercontent.com  (107.178.255.114:80)

Remove dailywiki.exe - Powered by Reason Core Security